A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. 3
B. 4
C. 11
D. 13
E. 14
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. Central Gateway
A. Layer 1 intercontroller roaming
B. Layer 2 intercontroller roaming
C. Layer 3 intercontroller roaming
D. intracontroller roaming
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D. all ISLs contained within a single chassis
E. higher latency and throughput than a core-edge design switch
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
A. 50
B. 100
C. 150
D. 200
E. 250
A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap
最新試題
Which statement about Fibre Channel communications is correct?()
Which two of these correctly describe Fibre Channel?()
What are two characteristics of OER? ()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What are two characteristics of GSS? ()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()